The following are the three types of responses: Open, Accepted: The computer responds and inquires if there is anything more it can assist you with. Closed, Not Listening: "This port is currently in use and unavailable at this moment," the computer says. Filtered, dropped, and blocked: The computer doesn't answer at all.
A port scan is a technique for identifying which ports are open on a network. Port scanning is similar to knocking on doors to determine whether somebody is home because ports on a computer are where information is transferred and received.
Security professionals use port scanning to identify any security vulnerabilities on a network since it identifies open ports and services available on that network.
Install a Firewall: A firewall can help protect your private network from unauthorised access. It is in charge of the exposed ports and their visibility. A port scan in process can potentially be detected and stopped down by firewalls.
Learner's Ratings
4.7
Overall Rating
87%
6%
2%
0%
5%
Reviews
A
Arnab Maity
5
It was very detailed and also most helpful for a beginner like me. thank you sandeep sir for teaching and advice ..I hope we can get e advance level ethical hacking course in future.
J
jashan soni
5
sir mere android kali linux main ek error aa raha hai , error at os level ye tab aata hai jab main androidhacking payload create karta hai
S
SHEKHAR MANSING CHORMALE
5
Very Helpful course Thank you learn vearn Providing this amazing and knowleging content
A
Amar Prakash
5
Great teaching by learnvern...and love Sandeep sir
J
Javad Akbari
5
Yes
M
Meet vimalbhai
5
Mobile hacking apk Not working on android 12 Please solve and upgraded apk
Shoriful Islam
5
It is a better bundle of Ethical hacking than others with certificate.
K
Kushal Pandita
5
100 Stars for Sandip Sir. Respect
V
Vishesh Tiwari
4
Thank you learn vern
J
Jabi Ali
5
forum is not supporting
Show More
Recommended Courses
Cyber Forensics Masterclass with Hands on learning
Share a personalized message with your friends.